[stem/master] Nicer intro for the hidden service tutorial

commit d09af0b30b07d2005bf1b9e487627fc358e57fcb Author: Damian Johnson <atagar@torproject.org> Date: Mon May 11 14:37:59 2015 -0700 Nicer intro for the hidden service tutorial Slight improvements, including an explanation of tor2web and a screenshot. --- docs/_static/duck_duck_go_hidden_service.png | Bin 0 -> 47402 bytes docs/tutorials/over_the_river.rst | 23 +++++++++++++++++++---- 2 files changed, 19 insertions(+), 4 deletions(-) diff --git a/docs/_static/duck_duck_go_hidden_service.png b/docs/_static/duck_duck_go_hidden_service.png new file mode 100644 index 0000000..9596144 Binary files /dev/null and b/docs/_static/duck_duck_go_hidden_service.png differ diff --git a/docs/tutorials/over_the_river.rst b/docs/tutorials/over_the_river.rst index b7aa8f4..2d51541 100644 --- a/docs/tutorials/over_the_river.rst +++ b/docs/tutorials/over_the_river.rst @@ -1,11 +1,26 @@ Over the River and Through the Wood =================================== -`Hidden services <https://www.torproject.org/docs/hidden-services.html.en>`_ give you a way of providing a service without exposing your address. These services are only accessible through Tor or `Tor2web <https://tor2web.org/>`_, and useful for a surprising number of things... +`Hidden services <https://www.torproject.org/docs/hidden-services.html.en>`_ +give you a way of providing a service without exposing your address. These +services are only accessible through Tor or `Tor2web <https://tor2web.org/>`_, +and useful for a surprising number of things... - * Hosting an anonymized site. This is usually the first thing that comes to mind, and something we'll demonstrate in a sec. - * Providing an endpoint Tor users can reach without exiting the Tor network. This eliminates the risk of an unreliable or malicious exit getting in the way. A great example of this is `Facebook <http://arstechnica.com/security/2014/10/facebook-offers-hidden-service-to-tor-users/>`_. - * Personal services. For instance you can host your home SSH server as a hidden service to prevent eavesdroppers from knowing where you live while traveling abroad. + * **Hosting an anonymized site**. This is usually the first thing that comes to mind, and something we'll demonstrate in a sec. + * Providing an **endpoint Tor users can reach** without exiting the Tor network. This eliminates the risk of an unreliable or malicious exit getting in the way. Great examples of this are `Facebook <http://arstechnica.com/security/2014/10/facebook-offers-hidden-service-to-tor-users/>`_ (*facebookcorewwwi.onion*) and `DuckDuckGo <https://lists.torproject.org/pipermail/tor-talk/2010-August/003095.html>`_ (*3g2upl4pq6kufc4m.onion*). + * **Personal services**. For instance you can host your home SSH server as a hidden service to prevent eavesdroppers from knowing where you live while traveling abroad. + +`Tor2web <https://tor2web.org/>`_ provides a quick and easy way of seeing if +your hidden service is working. To use it simply replace the **.onion** of +your address with **.tor2web.org**... + +.. image:: /_static/duck_duck_go_hidden_service.png + :target: https://3g2upl4pq6kufc4m.tor2web.org/ + +.. _running-a-hidden-service + +Running a hidden service +------------------------ Hidden services can be `configured through your torrc <https://www.torproject.org/docs/tor-manual.html.en#_hidden_service_options>`_, but Stem also provides some methods to easily work with them...
participants (1)
-
atagar@torproject.org